Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > BYOD reduces CAPEX, but at what cost to security?
    Business

    BYOD reduces CAPEX, but at what cost to security?

    Published by maria gbaf

    Posted on December 9, 2021

    4 min read

    Last updated: January 28, 2026

    Haleon announces a $54 million investment in its Richmond, US R&D centre, enhancing product innovation capabilities in the consumer healthcare sector.
    Haleon invests $54 million in US R&D centre for product innovation - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Quick Summary

    BYOD reduces CAPEX but increases security risks. A zero-trust approach and sophisticated strategies are essential for protecting networks.

    BYOD: Reducing Costs but Increasing Security Risks?

    By Dave Waterson, CEO, SentryBay

    In the Autumn of 2020, Gartner described two technologies that would have a transformational impact on global businesses within the next 10 years. One of these was secure access service edge, and the other was Bring Your Own PC (BYOPC). Driven by the need to ensure remote workers could continue to be productive, enabling the use of their own personal device, whether through a BYOPC or Bring your own Device (BYOD) approach became essential.

    But as the modern workplace has altered and become more diversified, new approaches to technology and its usage must be backed up with an equally fresh approach to cybersecurity. The National Cyber Security Centre has recently updated its advice with regard to designing, implementing and managing IT configurations based on a BYOD model. The Centre issued a stark warning to companies – if you have given BYOD users admin access to company resources, revoke it immediately, then come back. What it means by this is that planning is needed for new BYOD deployments, and a quick fix will not be enough to stave off the cybersecurity risks.

    Keeping control of access

    There is no doubt that BYOPC and BYOD have helped many organisations to manage the cost and feasibility of connecting remote workers and stakeholders such as partners and suppliers. But in sacrificing full control of the device, CISOs need to armour their corporate networks so they do have full control over access, regardless of whether they are working virtually, on the cloud or on-premises.

    Unmanaged endpoints, or devices on which the security posture is not updated constantly, represent a threat. If they are compromised by malware or hackers, they are at risk of keylogging or screen scraping attacks which can capture confidential or sensitive data. Other malware uses browser attacks which aim to exploit the log-in process of remote access systems.

    As the use of BYOD grows, so too does the risk of attack. While it can be challenging for security leaders to control devices, and even operating system levels or application versions (including browsers) remotely, it is certainly not an impossible task. The best way to move forward is by deploying complementary layers of solutions and services that come together to deter threats.

    Most fundamental is the need for a zero-trust approach which should blanket the entire network and all endpoints that connect with it. It might seem extreme to treat all users (and their devices) as a threat by default, but it is the only way to ensure that they can be verified. It’s why the adage “Never trust, always verify” has become so significant.

    Taking a sophisticated approach

    CISO’s must also adopt more sophisticated strategies than internet security, anti-virus software and securing the wireless network with virtual private networking (VPNs). The past months have proven that with new ways of working, this old triumvirate is no longer enough to ward off attack and certainly each individual approach will not be sufficient.

    Our recommendation is that security leaders specify and deploy software and solutions that have been specifically designed to protect endpoints and work as part of a zero trust approach. They ‘wrap’ data and applications securely to counteract cyberattacks particularly from common threats including keyloggers, screen scrapers, browser-based attacks, file interception, RDP double-hop or VNC attacks.

    It’s important not to underestimate the impact of these attacks. Key logging and screen grabbing are widely used to access sensitive data. If a keylogger is installed on a remote endpoint device which has a lower security posture than it would have within a secure network, cyber-attackers can gain full access as the user logs-in and to everything the user enters at the keyboard or displays on the local device.

    For this reason security software that protects data entry on unmanaged devices, particularly those that work with remote access apps like Citrix, VMWare, WVD, web browsers and Microsoft Office applications, is vital as part of a comprehensive, layered approach when deploying or redeploying BYOD.

    The message is clear that BYOD needs careful consideration and planning. It is highly effective at reducing capital expenditure on devices and it impacts positively on the time and cost of maintaining equipment, but that should not be at the cost of security. Data must be adequately protected from the moment it is entered at the keyboard or on the screen to the moment it reaches its destination, regardless of who owns or manages the device or its location.

    Key Takeaways

    • •BYOD can reduce CAPEX but increases security risks.
    • •Zero-trust approach is essential for network security.
    • •Unmanaged endpoints pose significant threats.
    • •Sophisticated security strategies are needed beyond traditional methods.
    • •Keylogging and screen scraping are major concerns.

    Frequently Asked Questions about BYOD reduces CAPEX, but at what cost to security?

    1What is the main topic?

    The article discusses the security risks associated with BYOD in reducing CAPEX.

    2How can companies mitigate BYOD risks?

    Implement a zero-trust network and deploy endpoint protection solutions.

    3Why is zero-trust important?

    Zero-trust ensures all users and devices are verified, reducing security risks.

    More from Business

    Explore more articles in the Business category

    Image for Empire Lending helps SMEs secure capital faster, without bank delays
    Empire Lending helps SMEs secure capital faster, without bank delays
    Image for Why Leen Kawas is Prioritizing Strategic Leadership at Propel Bio Partners
    Why Leen Kawas is Prioritizing Strategic Leadership at Propel Bio Partners
    Image for How Commercial Lending Software Platforms Are Structured and Utilized
    How Commercial Lending Software Platforms Are Structured and Utilized
    Image for Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Image for Why More Mortgage Brokers Are Choosing to Join a Network
    Why More Mortgage Brokers Are Choosing to Join a Network
    Image for From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    Image for From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    Image for Global Rankings Revealed: Top PMO Certifications Worldwide
    Global Rankings Revealed: Top PMO Certifications Worldwide
    Image for World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    Image for Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Image for The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    Image for Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    View All Business Posts
    Previous Business PostTechnology trends to watch out for in 2022
    Next Business PostGlobal supply chains: three predictions for the future